151 - 175 of 257
Number of results to display per page
151 Gopalakrishnan, GaneshExplicit-enumeration based verification made memory-efficientWe investigate techniques for reducing the memory requirements of a model checking tool employing explicit enumeration. Two techniques are studied in depth: (1) exploiting symmetries in the model, and (2) exploiting sequential regions in the model. The first technique resulted in a significant reduc...Verification; Model checking tool; Memory-efficient1995
152 Downes, Stephen M.Herbert Simon's computational models of scientific discoveryHerbert Simon's work on scientific discovery deserves serious attention by philosophers of science for several reasons. First, Simon was an early advocate of rational scientific discovery, contra Popper and logical empiricist philosophers of science (Simon 1966). This proposal spurred on investigati...Android epistemology; Psychological processes; Cognitive individualism1990
153 Spencer S. Eccles Health Sciences Library, University of UtahIAIMS Newsletter Summer 1998The IAIMS Newsletter is published quarterly (September, December, March, June) and provides valuable information about Library activities and resources as well as informative articles related to information technology.IAIMS1998-06-16
154 Johnson, Christopher R.; Parker, Steven G.; Hansen, Charles D.Interactive simulation and visualizationMost of us perform data analysis and visualization only after everything else is finished, which often means that we don't discover errors invalidating the results of our simulation until postprocessing. A better approach would be to improve the integration of simulation and visualization into the...Computational steering; Interactive simulation; Isosurfaces1999
155 Balasubramonian, RajeevMicroarchitectural techniques to reduce interconnect power in clustered processorsThe paper presents a preliminary evaluation of novel techniques that address a growing problem - power dissipation in on-chip interconnects. Recent studies have shown that around 50% of the dynamic power consumption in modern processors is within on-chip interconnects. The contribution of interc...Microarchitectural techniques; Interconnect power; Clustered processors; On-chip2004
156 Yang, Yue; Gopalakrishnan, Ganesh; Lindstrom, Gary E.; Slind, Konrad LeeNemos: a framework for axiomatic and executable specifications of memory consistency modelsConforming to the underlying memory consistency rules is a fundamental require- ment for implementing shared memory systems and writing multiprocessor programs. In order to promote understanding and enable automated verification, it is highly desir- able that a memory model specification be both ...Nemos; Shared memory systems2003
157 De St Germain, John Davison; Morris, Alan H.; Parker, Steven G.Performance analysis integration in the Uintah software development cycleThe increasing complexity of high-performance computing environments and programming methodologies presents challenges for empirical performance evaluation. Evolving parallel and distributed systems require performance technology that can be flexibly configured to observe different events and associ...Uintah; Problem solving environment; Performance analysis; Parallelism; C-SAFE2003
158 Bradshaw, Karen E.Physician Decision-Making: Evaluaton of Data Used in a Computerized ICUBiomedical Informatics1984
159 Warner, Homer R.Role of the Computer in Coronary CareBiomedical Informatics1972
160 Gardner, Reed M.Spirometry and Flow-Volume CurvesBiomedical Informatics1989
161 Carter, John B.Supporting persistent C++ objects in a distributed storage systemWe have designed and implemented a C++ object layer for Khazana, a distributed persistent storage system that exports a flat shared address space as its basic abstraction. The C++ layer described herein lets programmers use familiar C++ idioms to allocate, manipulate, and deallocate persistent share...persistent C++ objects; distributed storage; Khazana; flat shared address space1999
162 Fujimoto, Richard M.Systolic array synthesis by static analysis of program dependenciesWe present a technique for mapping recurrence equations to systolic arrays. While this problem has been studied in fairly great detail, the recurrence equations that are analysed here are a generalization of those studied previously. In a n earlier paper (14] we have showed how systolic arrays can b...Systolic array synthesis; static analysis; program dependencies; recurrence equations1986
163 Warner, Homer R.Time-Sharing in Biomedical ResearchBiomedical Informatics1966
164 Gardner, Reed M.Trouble-Shooting Pressure Monitoring Systems: When do the Numbers Lie?Biomedical Informatics1987
165 Regehr, JohnTwo case studies in predictable application scheduling using Rialto/NTThis paper analyzes the results of two case studies in applying the Rialto/NT scheduler to real Windows 2000 applications. The first study is of a soft modem-a modem whose signal processing work is performed on the host CPU, rather than on a dedicated signal processing chip. The second is of an audi...2001-01-01
166 Lindstrom, Gary E.Type-safe composition of object modulesWe describe a facility that enables routine type-checking during the linkage of external declarations and definitions of separately compiled programs in ANSI C. The primary advantage of our server-style type-checked linkage facility is the ability to program the combination of object modules via a s...object modules; ANSI C; Type-safe; type-checking1994
167 Davis, Alan L.A characterization of parallel systemsa taxonomy for parallel processing systems is presented which has some advantages over previous taxonomies. The taxonomy characterizes parallel processing systems using four parameters: topology, communication, granularity, and operation. These parameters and used repetitively in a hierarchical fash...Parallel systems1980
168 Lepreau, JayDRAFT: work in progress - - - comments solicited evolving Mach 3.0 to use migrating threadsLike most operating systems, Mach 3.0 views threads as statically associated with a single task. An alternative model is that of migrating threads, in which a single thread abstraction moves between tasks with the logical flow of control, and "server" code is passively executed. We have compatibly r...DRAFT1993
169 Gu, JunFast structured design of VLSI circuitsWe believe that a structured, user-friendly, cost-effective tool for rapid implementation of VLSI circuits which encourages students to participate directly in research projects are the key components in digital integrated circuit (IC) education. In this paper, we introduce our VLSI education activ...VLSI circuits; Rapid implementation1988
170 Regehr, JohnInferring scheduling behavior with hourglassAlthough computer programs explicitly represent data values, time values are usually implicit. This makes it difficult to analyze and debug real-time programs whose correctness depends partially on the time at which results are computed. This paper shows how to use Hourglass, an instrumented, synthe...2002-01-01
171 Smith, John MilesIntegrated specifications for abstract systemsStructural specifications define an abstract object as a composition of other abstract objects. Behavioral specifications define an abstract object in terms of its associated operations. Integrated specifications are a combination of structural and behavioral specifications which are more powerful t...1977
172 Hibler, Michael J.Microkernels meet recursive virtual machines (draft. May 10, 1996))This paper describes a novel approach to providing modular and extensible operating system functionality, and encapsulated environments, based on a synthesis of micro-kernel and virtual machine concepts. We have developed a virtualizable architecture that allows recursive virtual machines (virtual m...Microkernels; Virtual machines; Operating system functionality1996
173 Hoogenboom, Peter J.Semantic definition of a subset of the structured query language (SQL)SQL is a relational database definition and manipulation language. Portions of the manipulation language are readily described in terms of relational algebra. The semantics of a subset of the SQL select statement is described. The select statement allows the user to query the database. The select st...1991
174 Diamond, LisaSex, dating, passionate friendships, and romance: intimate peer relations among lesbian, gay, and bisexual adolescentsAlthough the raw number of adolescent romantic and sexual involvements is well documented, the actual experience and meaning of these relationships for adolescents receives little attention. As a result, these relationships are frequently classed together on the basis of surface similarities, despi...Teenagers; Relationships; Sex; Dating; Romance; Gays; Lesbians; Bisexuals1999
175 Hoogenboom, Peter J.System performance advisor user guideThe usage of the System Performance Advisor (SPA) expert system is described. Documentation of SPA system commands, system variables, diagnostic rules is given. Information on how to run the SPA system is discussed. In addition, an overview of how SPA searches for problems is supplied. The purpose o...System Performance Advisor; SPA; User guide1991
151 - 175 of 257